CyberArk Endpoint Privilege Manager and One Identity Safeguard are leading solutions in the endpoint security sector. CyberArk appears to have the upper hand in user satisfaction, particularly in pricing and support, whereas One Identity Safeguard is valued for its rich features that justify its higher cost.
Features: Users identify CyberArk Endpoint Privilege Manager for its integration capabilities, effective privilege management, and streamlined user controls. One Identity Safeguard stands out with its comprehensive session management, scalability, and robust security features.
Room for Improvement: CyberArk users suggest enhancements in reporting capabilities, simplified update processes, and more user-friendly interfaces. For One Identity Safeguard, improvements in response time, configuration simplicity, and user documentation are highlighted.
Ease of Deployment and Customer Service: CyberArk Endpoint Privilege Manager offers straightforward deployment and responsive customer service, making it a good fit for fast implementation. One Identity Safeguard, despite requiring more complex setup, provides a comprehensive support framework appreciated by users.
Pricing and ROI: CyberArk Endpoint Privilege Manager is seen as cost-effective with its competitive setup costs and quick ROI. One Identity Safeguard, although higher in upfront costs, provides long-term value due to its extensive features, offering a justified investment for many organizations.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
Any PAM solution, when I deploy it well and customers use it, leads to a return on investment.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
I sometimes need escalations to reach expertise.
Sometimes, I get a very helpful response and they address issues on a call.
When I have day-to-day incidents and problems, the response is good enough in terms of time and quality.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
The scalability of One Identity Safeguard is perfect, scoring ten out of ten.
We have a cluster of SPPs and a cluster of SPSs, and we can add a node to that cluster without much fuss.
I would rate it a nine out of ten for scalability.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
I would rate it a nine out of ten for stability.
In terms of stability, I rate One Identity Safeguard nine to ten out of ten.
I encounter problems primarily with the failover procedure.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
For some configurations on the SPS side, if I need to make changes, such as for DNS servers, I must redeploy the machine.
There are many steps. We are still in the onboarding phase, and it seems very manual.
Another area for improvement could be the threat detection capabilities, like those seen in other PAM vendors.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
It is one of those where the more you buy, the cheaper it is.
It is cheaper than CyberArk.
The pricing of One Identity Safeguard is fairly priced and cheaper than other solutions of the same enterprise level.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
The most valuable feature is the ability to control users with admin rights.
The auditing and approval mechanisms are features we did not have before and are greatly appreciated.
I think One Identity should improve its documentation because it is vast and not clear, and clear documentation on implementing the solution would be advantageous for consultants.
Compared to other PAM solutions, it is easy to implement and use from an administrator's point of view.
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
One Identity Safeguard manages and monitors privileged access, enhancing security with features like automatic session recording, real-time monitoring, and credential rotation. It integrates seamlessly, supports compliance with audit trails, and improves operational efficiency across organizations. This robust platform significantly bolsters security protocols while controlling sensitive operations.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.